메뉴 건너뛰기




Volumn , Issue , 2003, Pages 24-34

Security considerations when designing a distributed file system using object storage devices

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; DIGITAL STORAGE; VIRTUAL STORAGE;

EID: 84962770253     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SISW.2002.1183507     Document Type: Conference Paper
Times cited : (15)

References (21)
  • 2
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • April
    • S. M. Bellovin. Security problems in the TCP/IP protocol suite. Computer Communication Review, 19(2):32-48, April 1989.
    • (1989) Computer Communication Review , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 14
    • 84978429558 scopus 로고    scopus 로고
    • Separating key management from file system security
    • December
    • D. Mazieres, M. Kaminsky, M. Kaashoek, and E. Witchel. Separating key management from file system security. In SOSP, December 1999.
    • (1999) SOSP
    • Mazieres, D.1    Kaminsky, M.2    Kaashoek, M.3    Witchel, E.4
  • 16
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • C. Neumann and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, September 1994.
    • (1994) IEEE Communications Magazine
    • Neumann, C.1    Ts'o, T.2
  • 17
    • 0033906295 scopus 로고    scopus 로고
    • Authenticating network-attached storage
    • January/February
    • B. C. Reed, E. G. Chron, R. C. Burns, and D. D. Long. Authenticating network-attached storage. IEEE Micro, 20(1):49-57, January/February 2000.
    • (2000) IEEE Micro , vol.20 , Issue.1 , pp. 49-57
    • Reed, B.C.1    Chron, E.G.2    Burns, R.C.3    Long, D.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.